Fusion-io exec describes how the company's hardware and software enable data center managers to build faster, more cost-effective storage arrays, in the latest episode of Valley View.
Gary Orenstein, Fusion-io's senior VP of product, says his company's purpose is to make the world's data go faster. Data is everywhere--the cloud, the Web--but it's on disk, which is too slow for many of today's demanding data needs. With Fusion-io's IoDrives and Ion Data Accelerator software, data center managers can build solid-state, flash-based storage arrays across physical and virtual servers more cost effectively. And it does so with a smaller footprint, which is crucial in today's data center.
Orenstein says Fusion-io is doing lots of work in organizations using Oracle, Microsoft, and MySQL databases, and is also starting to see some big data deployments using MongoDB.
Orenstein boiled all of this down into his 3-minute elevator pitch on Valley View recently and came out shining in front of our judges. You can watch it all in the video embedded below.
Make sure to tune into our October Valley View, on October 24 at 11 a.m. Pacific Time, where we'll have more startups--including Taptera (enterprise mobile applications), Alteryx (big data), and Hearsay Social (social enterprise). We'll also feature conversations with Cisco CEO John Chambers, and Oracle president Mark Hurd. You can also register for the October Valley View show and have a chance to win some excellent gear.
Informationweek.com run-of-site player, used to publish article embedded videos via DCT. The same ads will be served on this player regardless of embed location.
Dark Reading Tech Digest, Dec. 19, 2014Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
10 Recommendations for Outsourcing SecurityEnterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
5 Top Tips For Outsourced SecurityIt's one thing to hire a third-party developer to build a mobile app. It's quite another to trust a pen tester, MSSP, or DDoS protection firm. But the fact is, the threat landscape is complex, and few organizations can keep security completely in house. Here's how to decide what to outsource and select and manage providers.
Published: 2015-01-26 The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
Published: 2015-01-26 Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
Published: 2015-01-26 Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
Published: 2015-01-26 Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.
Published: 2015-01-26 MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.